Search results for "AUTHENTICATION"

showing 10 items of 108 documents

Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education

2019

Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…

pedagogical approachessähköinen arviointiresponsible research and innovationeducación superiorhenkilöllisyysauthorship verificationverificación de autoríae-assessmentidentitytekijyysAuditor's reportAuthentication4. Education05 social scienceseducació superior050301 educationelectronic authenticationPublic relationsAuthentication (law)Autentificación de documentosverifiointitodentaminenhigher educatione-authenticationThe InternetPsychologyautenticación electrónica050101 languages & linguisticsplagiointiHigher educationBest practiceCheatingData securityautenticacióEducationautenticación0501 psychology and cognitive sciencestietoturvaauthorshipcheating detectionbusiness.industrytrustInformation securityautenticació electrònicae-arviointiAutenticació de documentsverificació de l'autoriabusiness0503 educationarviointi
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020

2010

In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.

Information privacyWork (electrical)Security serviceOrder (exchange)business.industryPolitical scienceInternet privacyMessage authentication codeCellular communication systemsComputer securitycomputer.software_genrebusinesscomputer
researchProduct

Acceptability of the e-authentication in higher education studies: views of students with special educational needs and disabilities

2021

AbstractTrust-based e-assessment systems are increasingly important in the digital age for both academic institutions and students, including students with special educational needs and disabilities (SEND). Recent literature indicates a growing number of studies about e-authentication and authorship verification for quality assurance with more flexible modes of assessment. Yet understanding the acceptability of e-authentication systems among SEND students is underexplored. This study examines SEND students’ views about the use of e-authentication systems, including perceived advantages and disadvantages of new technology-enhanced assessment. This study aims to shed light on this area by exa…

030506 rehabilitationPersonal dataeducación superiorSpecial educationaccesibilidadAcceptabilitymedia_commonlcsh:LC8-6691lcsh:T58.5-58.64lcsh:Information technology4. Education05 social scienceseducació superiordades personals050301 educatione-AuthenticationAccessibilityAuthentication (law)acceptabilitatComputer Science ApplicationssaavutettavuusStudents with special educational needs and disabilitiesaccessibilitat0305 other medical sciencePsychologyResearch Articleautenticación electrónicaEducation HigherHigher educationmedia_common.quotation_subjectCheatingInternet privacyEducationerityisopiskelijat03 medical and health sciencesOriginalityaceptabilidadEnsenyament universitariHigher educationsähköinen tunnistaminendatos personaleslcsh:Special aspects of educationbusiness.industryEducational technologyestudiantes con necesidades educativas especiales y discapacidadesautenticació electrònicahenkilötiedotkorkeakouluopiskeluKey (cryptography)Enseñanza universitariaComputerized adaptive testingbusiness0503 educationestudiants amb necessitats educatives especials i discapacitats
researchProduct

One confession, multiple chronotopes: The interdiscursive authentication of an apology in an international criminal trial

2020

060201 languages & linguisticsLinguistics and Language060101 anthropologySociology and Political ScienceCriminal trial06 humanities and the artsConfessionLanguage and LinguisticsAuthentication (law)PhilosophyHistory and Philosophy of ScienceLaw0602 languages and literature0601 history and archaeologySociologyChronotopeJournal of Sociolinguistics
researchProduct

Computer Networks

2018

This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.

wireless networksroutersoptical networksnetwork architecturesecurityqueueing systemstelecommunication networksQuality of Service (QoS)radioauthenticationcomputer networksdata securitytelecommunciation trafficwireless sensor networksInternet protocolsenergy efficiency
researchProduct

Development of a high performance thin layer chromatography method for the rapid qualification and quantification of phenolic compounds and abscisic …

2019

Honey is a natural product with a complex chemical composition consisting of sugars and other bioactive compounds. It is important in many traditional systems of medicine, exhibiting interesting bioactivities, in particular antimicrobial, anti-inflammatory and antioxidant effects. Authentication of botanical origin of honeys is particularly important in this context. Therefore, methods for quality control of honey and detection of its adulteration are very important. A HPTLC method for the quantitative determination of phenolic compounds in honey was developed for the first time. Seven phenolic compounds were detected and determined quantitatively in lime and acacia honey samples. The obtai…

Quality ControlAuthentication of monofloral honeysanimal structuresAcaciaContext (language use)engineering.material010402 general chemistry01 natural sciencesBiochemistryAntioxidantsAnalytical Chemistrychemistry.chemical_compoundPhenolsHigh performance thin layer chromatographyAbscisic acidLimeNatural productChromatographybiologyChromatographic fingerprintsOptimization of chromatographic conditionsHigh-performance thin-layer chromatographydigestive oral and skin physiologyfungi010401 analytical chemistryOrganic Chemistryfood and beveragesHoneyGeneral MedicineAntimicrobialbiology.organism_classificationPhenolic compoundsThin-layer chromatography0104 chemical scienceschemistrybehavior and behavior mechanismsengineeringChromatography Thin LayerFood AnalysisAbscisic AcidJournal of Chromatography A
researchProduct

An improvement of the batch-authentication and key agreement framework for P2P-based online social networks

2014

Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.

Authenticationbusiness.industryComputer scienceAuthentication protocolNetwork Access ControlData_MISCELLANEOUSChallenge–response authenticationEncryptionbusinessAKAComputer network2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

A melanocortin 1 receptor (MC1R) gene polymorphism is useful for authentication of Massese sheep dairy products

2011

Massese is an Italian sheep breed, with black or grey coat colour, mainly reared in the Tuscany and Emilia Romagna regions. Recently, the emerging interests in this breed have resulted in the production of Pecorino cheese obtained with only Massese milk. In order to be profitable, this marketing link between Massese breed and its products should be defended against fraudsters who could include milk of other sheep breeds or cow milk in Massese labelled productions. To identify the genetic factors affecting coat colour in sheep, we have recently analysed the melanocortin 1 receptor (MC1R) gene and identified several single nucleotide polymorphisms (SNPs). In this work, as a first step to set …

AUTHENTICATION OF FOOD PRODUCTSCoatVeterinary medicineSNPFood ContaminationSingle-nucleotide polymorphismBiologyPolymerase Chain ReactionPolymorphism Single NucleotideSensitivity and SpecificityMASSESECow milkSettore AGR/17 - Zootecnica Generale E Miglioramento GeneticoGene FrequencySpecies SpecificityCheesePolymorphism (computer science)MC1RAnimalsAlleleGeneticsSheepfood and beveragesDNAGeneral MedicineBreedMilkFemaleAnimal Science and ZoologyDairy Productsauthentication Massese MC1R mono-breed products sheep breeds SNPReceptor Melanocortin Type 1DAIRY SHEEPPolymorphism Restriction Fragment LengthMc1r geneFood ScienceMelanocortin 1 receptor
researchProduct

An extended JADE-S based framework for developing secure Multi-Agent Systems

2009

Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)AuthenticationPublic key certificateComputer sciencebusiness.industryMulti-agent systemmedia_common.quotation_subjectJADE (programming language)Access controlMulti-Agent Systems Security Biometric Authentication SystemsComputer securitycomputer.software_genreHardware and ArchitectureStrong authenticationbusinessLawcomputerSoftwareComputer networkReputationmedia_commoncomputer.programming_languageComputer Standards & Interfaces
researchProduct